Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

In wireless, every device can moves anywhere without any infrastructure also the information can be maintained constantly for routing the traffic. The open issues of wireless Adhoc network the attacks which are chosen the forwarding attack that is dropped by malicious node to corrupt the network performance then the information integrity exposure. Aim of the problem that existing methods in Adhoc network for malicious node detection which cannot assure the traceability of the node as well as the fairness of node detection. In this paper, the proposed heterogeneous cluster based secure routing scheme provides trust based secure network for detection of attacks such as wormhole and black hole caused by malicious nodes presence in wireless Adhoc network. The simulation result shows that the proposed model is detect the malicious nodes effectively in wireless Adhoc networks. The malicious node detection efficiency can be achieved 96% also energy consumption also 10% better than existing method.

[1]  J. S. Shah,et al.  Detection and avoidance of malicious node in MANET , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[2]  Muhammad Sheikh Sadi,et al.  An Efficient Approach to Select Cluster Head in Wireless Sensor Networks , 2011, J. Commun..

[3]  Sudip Misra,et al.  Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes , 2016, IEEE Transactions on Network and Service Management.

[4]  Qiuwei Yang,et al.  Survey of Security Technologies on Wireless Sensor Networks , 2015, J. Sensors.

[5]  Ing-Ray Chen,et al.  Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.

[6]  P. Latha,et al.  Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[7]  Hussein Al-Bahadili,et al.  A fair trust-based malicious node detection and isolation scheme for WSNs , 2017, 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS).

[8]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[9]  Zhihua Zhang,et al.  Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks , 2017, IEEE Access.

[10]  Yang Xiao,et al.  Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks , 2013, IEEE Systems Journal.

[11]  Deepika Kukreja,et al.  Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack , 2018, J. Ambient Intell. Humaniz. Comput..

[12]  Donghui Li,et al.  A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs , 2018, IEEE Access.

[13]  Dilip Sarkar,et al.  Detection of Good and Bad Sensor Nodes in the Presence of Malicious Attacks and Its Application to Data Aggregation , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[14]  A. Sampathkumar,et al.  Gene Selection Using Parallel Lion Optimization Method in Microarray Data for Cancer Classification , 2019, J. Medical Imaging Health Informatics.

[15]  Mohammad Ali Jabraeil Jamali,et al.  A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks , 2019, J. Ambient Intell. Humaniz. Comput..

[16]  Rung Ching Chen,et al.  Using ambient intelligence to extend network lifetime in wireless sensor networks , 2016, J. Ambient Intell. Humaniz. Comput..